Export Citations
No abstract available.
Reviewers
Mining Individual Life Pattern Based on Location History
The increasing pervasiveness of location-acquisition technologies (GPS, GSM networks, etc.) enables people to conveniently log their location history into spatial-temporal data, thus giving rise to the necessity as well as opportunity to discovery ...
A Message Processing Method for Top-k Query for Traffic Reduction in Ad Hoc Networks
In ad hoc networks, to acquire only necessary data items, it is effective that each mobile node retrieves data items using a top-k query, in which data items are ordered by the score of a particular attribute, and the query-issuing mobile node acquires ...
Operator Placement for Snapshot Multi-predicate Queries in Wireless Sensor Networks
This work aims at minimize the cost of answering snapshot multi-predicate queries in high-communication-cost networks. High-communication-cost (HCC) networks is a family of networks where communicating data is very demanding in resources, for example in ...
Privacy-Aware Proximity Based Services
Proximity based services are location based services (LBS) in which the service adaptation depends on the comparison between a given threshold value and the distance between a user and other (possibly moving) entities. While privacy preservation in LBS ...
Efficient Capturing of Environmental Data with Mobile RFID Readers
In this paper we introduce a novel scenario for environmental sensing based on the combination of simple and cheap RFID-based sensors and mobile devices like mobile phones with integrated RFID readers. We envision a system that exploits the availability ...
Finding Probabilistic Nearest Neighbors for Query Objects with Imprecise Locations
A nearest neighbor query is an important notion in spatial databases and moving object databases.In the emerging application fields of moving object technologies, such as mobile sensors and mobile robotics, the location of an object is often imprecise ...
PLOT: Privacy in Location Based Services: An Open-Ended Toolbox
The widespread adoption of Location Based Services (LBSs) coupled with recent advances in location tracking technologies, pose serious concerns to user privacy. As a consequence, privacy preserving approaches have been proposed to protect the location ...
Information-Gradient Based Decentralized Data Management over RFID Tag Clouds
The tasks in the physical environments are mainly information centric processes, such as search and exploration of physical objects. We have developed an informational environment, AURA that supports object searches in the physical world1. The goal of ...
Aggregate Location Monitoring for Wireless Sensor Networks: A Histogram-Based Approach
Location monitoring systems are used to detect human activities and provide monitoring services, e.g., aggregate queries. In this paper, we consider an aggregate location monitoring system where wireless sensor nodes are counting sensors that are only ...
On the Energy Efficiency for Heterogeneous Data Broadcasting
Data broadcast is an advanced technique to realize large scalability and bandwidth utilization in a mobile computing environment. In the heterogeneous data broadcast, the data size is variant with time in multiple broadcast channels. However, ...
Mobile Access to MPEG-7 Based Multimedia Services
Multimedia information systems have been developed into service-ware. With the paradigms of web services, service oriented architectures (SOA), and Web 2.0 widgets, multimedia has become truly ubiquitous. However, interoperability, scalability, ...
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have been proposed to identify misbehaving nodes. Most of these security schemes ...
Graph Model Based Indoor Tracking
The tracking of the locations of moving objects in large indoor spaces is important, as it enables a range of applications related to, e.g., security and indoor navigation and guidance. This paper presents a graph model based approach to indoor tracking ...
A Concurrency Control Protocol for Continuously Monitoring Moving Objects
The increasing usage of location-aware devices, such as GPS and RFID, has made moving object management an important task. Especially, being demanded in real-world applications, continuous query processing on moving objects has attracted significant ...
SLA-Aware Adaptive On-demand Data Broadcasting in Wireless Environments
In mobile and wireless networks, data broadcasting for popular data items enables the efficient utilization of the limited wireless bandwidth. However, efficient data scheduling schemes are needed to fully exploit the benefits of data broadcasting. This ...
DigestJoin: Exploiting Fast Random Reads for Flash-Based Joins
Flash disks have been an emerging secondary storage media. In particular, there have been portable devices, multimedia players and laptop computers that are configured with no magnetic disks but flash disks.It is envisioned that some RDBMSs will operate ...
Thresholded Range Aggregation in Sensor Networks
The recent advances in wireless sensor technologies (e.g., Mica, Telos motes) enable the economic deployment of lightweight sensors for capturing data from their surrounding environment, serving various monitoring tasks, like forest wildfire alarming ...
ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in LBS
One of the privacy threats recognized in the use of LBS is represented by an adversary having information about the presence of individuals in certain locations, and using this information together with an (anonymous) LBS request to re-identify the ...